Quick Summary of Basic and Common Linux Commands

There are many commands that are used in linux on a daily basis, ones that everyone should know just to get by. Like back in the days of DOS, you had to know how to work with the command line and how to navigate around. Learning new commands is always hard, especially when there are so many new ones that don't always seem to make sense in their names.

cd

Change directory - this command is essential for traversing folders and moving about your linux computer. Its quite straight forward, cd /where/you/want/togo or cd .. to go up a level. It's pretty basic, but be aware of absolute and relative paths. If you are currently in the folder /home/puppy/pictures then you can type cd .. to move up to /home/puppy/ or you could type cd /home/puppy/ not to mention cd ~/puppy/. You must learn how to traverse folders effectively before you can use the operating system.

ls

The ls command gives you a directory listing. This command has many options, but basically provides you with the same information as the "dir" command in DOS. The most common use of ls is probably "ls -la" infact many people have an alias setup, so whenever they type "ls" it actually runs "ls -la".

du

The disk usage command gives you a summary of how much space a program or some piece of data is using. Normally this command uses the -h feature, which simply means it will tell you if the number it gives you is in bytes, kilobytes, etc. -h gives you the human readable output.

mv

Move! The mv command is the move command, but it is far more powerful than the old DOS commands. You must be very careful when using the mv command, if you tell it to move a program to a new location, it will overwrite the stuff that was there, if the same file name exists. In addition the mv command is also the rename command! If I type: mv file1 file2 I just moved or effectively renamed file1 to file2!

date

The date command displays the current date and time of your server to the screen, and can be formatted in many ways, but date by itself will display something similar to: Sat Apr 30 23:58:41 EDT 2005

cp

The copy command is a great program, and is very powerful. Often used with the -R (recursive) option, it can be used to copy single files, or entire paths around with ease.

rmdir

Remove directory is a command that I personally don't use very often. To remove a directory it must be empty, rarely do I take the time to empty a directory before I delete it. Instead I use a variation of the rm command.

rm

This is the mother of all linux commands. Remove. You must always be very careful when you use this program. There aren't too many options with this program, its quite straight forward, you use it to delete things. -R is recursive and -f is force. If you want to clear a big folder and you are 100% sure you want it gone in a hurry, type: rm -Rf /directoryname

chgrp

Change group - this command is used to change the group ownership on a file. For the most part this is more of an administrative thing, and end users don't typically have to worry too often about this. You must know about the design of the linux file system before you worry about the chgrp command.

chown

Change owner - this command very similar to the chgrp command, and changes the owner instead of the group. Again you must really understand the design of the linux file system before this becomes really important. File ownership is an important part of security and permissions in linux.

mkdir

Make directory - this is a very straight forward command in linux, easy to use, just mkdir newfoldername

vi

This is a text editor in linux, its extremely powerful, but not exactly user friendly. I highly suggest that you take the time to learn this program, or at least the most common features. If you want to play with this program, you might get stuck inside it, remember these words. Escape, Colon, q, ! ( escape key, :q! ) That gets you out of interactive or insert mode, then gets you to the menu, then quit without saving!

su

Switch user - the su command lets you login from your account to another account. If you are root, you can type su - username and jump to any account without a password. If you are a normal user account and want to go to root then type su - root. If you do not put the hyphen then you will not use that users environment. Generally if you are logging in as a user it's a good idea to be in their working environment!

pwd

Print working directory - this command gives you the current directory you are working in.

$ pwd - me running command

/home/username/my_pics - this is the output from that command

As I mentioned earlier, there are so many different commands to learn, it really just takes time and effort to play with them and learn their options. The manual (MAN) pages in linux are really great and full of information. Many of the most common commands are located in the /bin folder, check it out!

Ken Dennis http://kendennis-rss.homeip.net/

recurring cleaning service Mundelein ..
In The News:

New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.

Microsoft CRM Implementation ? Fundamental CRM Principles Revision

Microsoft CRM is relatively new player on the now becoming... Read More

Microsoft Great Plains Customization and Development ? Overview for Programmer

When Great Plains Software was designing and developing Great Plains... Read More

Microsoft Great Plains Customization Tools Evolution ? Overview for Consultant

When Great Plains Software introduced the first graphical accounting application... Read More

Microsoft CRM and Great Plains Implementation: Freight Forwarding Business Automation Example

Microsoft Business Solutions offers several ERP applications: Great Plains, Navision,... Read More

Microsoft Great Plains eCommerce: overview for developer

Microsoft Business Solutions Great Plains was designed back in the... Read More

Microsoft Great Plains PM: Payables Management

Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More

Microsoft Update - 5 Reasons to Update Service Pack 2

Microsoft released Service Pack 2 (SP2) for the Windows XP... Read More

Groupware: Avoid the Ad Hoc Shuffle

GroupwareEfforts are continually made to manage the unavoidable ad hoc... Read More

Save Your Resources - Combine Your IM Clients

There are so many different programs that clutter up your... Read More

Microsoft Great Plains: Data Conversion & Migration Scenarios ? Overview for Consultant

Microsoft Business Solutions Great Plains serves multiple industries in the... Read More

OSI Layers Model

IntroductionDuring the early years of our modern computer era, very... Read More

How To Create A Data Capture Procedure Checklist For Your Small Business CRM Software

Fortunately one of the most common reasons cited for the... Read More

Microsoft Great Plains FA: Fixed Assets ? Overview For Consultant

Great Plains Fixed Assets Management module is a robust tool... Read More

Microsoft Great Plains Installation ? Overview for IT Director/Controller

Microsoft Great Plains is main mid-market application from Microsoft Business... Read More

Microsoft Great Plains Implementation: Collection Management ? Overview For Consultant

Microsoft Business Solutions Great Plains is very good fit for... Read More

20 Extra Hours Per Week: What Would You Do?

While I was in college, if you would have asked... Read More

Anti-Spyware Protection ? Holes in the Shining Armor

Looking at all the ads which promise to get rid... Read More

Artificial Intelligence And Intuition

The intuitive algorithm.Roger Penrose considered it impossible. Thinking could never... Read More

Intro to UNIX Shells

A UNIX Shell is in simplest terms, a command line... Read More

A Case Study on Selecting Contract Management Software

Professional services firm cuts costs and improves productivity with integrated... Read More

Performance Tuning of a Daffodil DB / One$DB -JDBC Application

This article illustrates the best practices to improve the performance... Read More

7 Things to Consider Before Buying Small Business Accounting Software

The world of small business accounting software can be a... Read More

Business Planning Software

Once a business idea is selected, it is highly recommended... Read More

ERP Implementation: Success Factors

As seeing large number of implementations ? in our case... Read More

Most Dangerous Types of Spyware are on the Rise: How to Choose the Weapon

Bad News - the Threat is Bigger than it SeemedHow... Read More

tidy up service Buffalo Grove ..